[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …
reputation for not only building Machine Learning (ML) models that rely on distributed …
Temporal dynamics-aware adversarial attacks on discrete-time dynamic graph models
Real-world graphs such as social networks, communication networks, and rating networks
are constantly evolving over time. Many deep learning architectures have been developed …
are constantly evolving over time. Many deep learning architectures have been developed …
Low-epsilon adversarial attack against a neural network online image stream classifier
An adversary intercepts a stream of images between a sender and a receiver neural network
classifier. To minimize its footprint, the adversary only attacks a limited number of images …
classifier. To minimize its footprint, the adversary only attacks a limited number of images …
Poisoning generative replay in continual learning to promote forgetting
Generative models have grown into the workhorse of many state-of-the-art machine learning
methods. However, their vulnerability under poisoning attacks has been largely …
methods. However, their vulnerability under poisoning attacks has been largely …
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives
Data economy relies on data-driven systems and complex machine learning applications
are fueled by them. Unfortunately, however, machine learning models are exposed to …
are fueled by them. Unfortunately, however, machine learning models are exposed to …
Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense
Deep neural networks, particularly in vision tasks, are notably susceptible to adversarial
perturbations. To overcome this challenge, developing a robust classifier is crucial. In light of …
perturbations. To overcome this challenge, developing a robust classifier is crucial. In light of …
Accelerating adversarial attack using process-in-memory architecture
Recent research has demonstrated that machine learning algorithms are vulnerable to
adversarial attacks, in which small but carefully crafted input perturbations can lead to …
adversarial attacks, in which small but carefully crafted input perturbations can lead to …
Limited budget adversarial attack against online image stream
HM Arjomandi, M Khalooei… - ICML 2021 Workshop on …, 2021 - openreview.net
An adversary wants to attack a limited number of images within a stream of known length to
reduce the exposure risk. Also, the adversary wants to maximize the success rate of the …
reduce the exposure risk. Also, the adversary wants to maximize the success rate of the …
Low-epsilon adversarial attack against a neural network online image stream classifier
H Mohasel Arjomandi, M Khalooei, M Amirmazlaghani - 2023 - dl.acm.org
An adversary intercepts a stream of images between a sender and a receiver neural network
classifier. To minimize its footprint, the adversary only attacks a limited number of images …
classifier. To minimize its footprint, the adversary only attacks a limited number of images …
[PDF][PDF] Interpretable Machine Learning (IML) Methods: Classification and Solutions for Transparent Models
AG Tehrani - 2024 - uwspace.uwaterloo.ca
This thesis explores the realm of machine learning (ML), focusing on enhancing model
interpretability called interpretable machine learning (IML) techniques. The initial chapter …
interpretability called interpretable machine learning (IML) techniques. The initial chapter …